Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Virtualization Security, Strategy and Management
(Articles)
Simon Tran
,
Stuart Gold
Int'l J. of Communications, Network and System Sciences
Vol.7 No.10
,October 16, 2014
DOI:
10.4236/ijcns.2014.710043
5,111
Downloads
6,645
Views
Citations
This article belongs to the Special Issue on
Virtual Network
Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment
(Articles)
Gabriel Cephas Obasuyi
,
Arif Sari
Int'l J. of Communications, Network and System Sciences
Vol.8 No.7
,July 17, 2015
DOI:
10.4236/ijcns.2015.87026
6,929
Downloads
9,309
Views
Citations
Analyzing Security Threats to Virtual Machines Monitor in Cloud Computing Environment
(Articles)
Ahmad Fayez S. Althobaiti
Journal of Information Security
Vol.8 No.1
,December 7, 2016
DOI:
10.4236/jis.2017.81001
3,514
Downloads
7,424
Views
Citations
A Novel Training System of Lathe Works on Virtual Operating Platform
(Articles)
Hui-Chin Chang
Journal of Software Engineering and Applications
Vol.3 No.3
,April 8, 2010
DOI:
10.4236/jsea.2010.33035
9,235
Downloads
15,688
Views
Citations
The Virtual Education during the COVID-19 Pandemic Era (Empirical Evidence on Student’s Online Experience)
(Articles)
Khairi Mohamed Omar
Creative Education
Vol.12 No.12
,December 31, 2021
DOI:
10.4236/ce.2021.1212222
343
Downloads
2,025
Views
Citations
Google Maps Security Concerns
(Articles)
Aqil Burney
,
Muhammad Asif
,
Zain Abbas
,
Shamaila Burney
Journal of Computer and Communications
Vol.6 No.1
,January 8, 2018
DOI:
10.4236/jcc.2018.61027
3,369
Downloads
14,211
Views
Citations
A Virtual Synchronous Machine to Support Dynamic Frequency Control in a Mini-Grid That Operates in Frequency Droop Mode
(Articles)
Miguel Torres
,
Luiz A. C. Lopes
Energy and Power Engineering
Vol.5 No.3
,May 13, 2013
DOI:
10.4236/epe.2013.53025
7,681
Downloads
10,862
Views
Citations
Optimised Migrate Virtual Machine Rejuvenation
(Articles)
Sanheji Manel
,
Azizi Ridha
,
Maaloul Alia
Journal of Computer and Communications
Vol.3 No.8
,August 14, 2015
DOI:
10.4236/jcc.2015.38004
4,140
Downloads
5,215
Views
Citations
Enhancing the Performance of Current Online Education System—A Study of Cloud Computing and Virtualization
(Articles)
Basheer Riskhan
,
Raza Muhammed
Journal of Computer and Communications
Vol.3 No.10
,October 30, 2015
DOI:
10.4236/jcc.2015.310006
3,673
Downloads
4,779
Views
Citations
Energy Aware Processor Architecture for Effective Scheduling and Power Management in Cloud Using Inclusive Power-Cognizant Processor Controller
(Articles)
Suma Sira Jacob
,
C. Kezi Selva Vijila
Circuits and Systems
Vol.7 No.8
,June 22, 2016
DOI:
10.4236/cs.2016.78157
1,765
Downloads
2,923
Views
Citations
Evaluation of a Cloud Management System for Live Migrations
(Articles)
Md Israfil Biswas
,
Philip Morrow
,
Sally McClean
Journal of Computer and Communications
Vol.7 No.11
,November 29, 2019
DOI:
10.4236/jcc.2019.711009
682
Downloads
1,627
Views
Citations
Implications of Implementation of Artificial Intelligence in the Banking Business with Correlation to the Human Factor
(Articles)
Krunoslav Ris
,
Zeljko Stankovic
,
Zoran Avramovic
Journal of Computer and Communications
Vol.8 No.11
,November 27, 2020
DOI:
10.4236/jcc.2020.811010
3,467
Downloads
8,418
Views
Citations
Social Media Cyberbullying Detection on Political Violence from Bangla Texts Using Machine Learning Algorithm
(Articles)
Md. Tofael Ahmed
,
Almas Hossain Antar
,
Maqsudur Rahman
,
Abu Zafor Muhammad Touhidul Islam
,
Dipankar Das
,
Md. Golam Rashed
Journal of Intelligent Learning Systems and Applications
Vol.15 No.4
,November 6, 2023
DOI:
10.4236/jilsa.2023.154008
319
Downloads
1,179
Views
Citations
Effective and Extensive Virtual Private Network
(Articles)
Tarek S. Sobh
,
Yasser Aly
Journal of Information Security
Vol.2 No.1
,January 31, 2011
DOI:
10.4236/jis.2011.21004
7,387
Downloads
15,686
Views
Citations
A Decision Tree Classifier for Intrusion Detection Priority Tagging
(Articles)
Adel Ammar
Journal of Computer and Communications
Vol.3 No.4
,April 16, 2015
DOI:
10.4236/jcc.2015.34006
5,790
Downloads
7,862
Views
Citations
The Overview of Database Security Threats’ Solutions: Traditional and Machine Learning
(Articles)
Yong Wang
,
Jinsong Xi
,
Tong Cheng
Journal of Information Security
Vol.12 No.1
,January 11, 2021
DOI:
10.4236/jis.2021.121002
3,307
Downloads
11,602
Views
Citations
Implementation of Machine Learning Method for the Detection and Prevention of Attack in Supervised Network
(Articles)
Patrick Dany Bavoua Kenfack
,
Fabrice Kwefeu Mbakop
,
Edward Eyong-Ebai
Open Access Library Journal
Vol.8 No.12
,December 30, 2021
DOI:
10.4236/oalib.1108000
214
Downloads
1,672
Views
Citations
Security Implications of Edge Computing in Cloud Networks
(Articles)
Sina Ahmadi
Journal of Computer and Communications
Vol.12 No.2
,February 9, 2024
DOI:
10.4236/jcc.2024.122003
415
Downloads
2,177
Views
Citations
Enhancing Cybersecurity through AI and ML: Strategies, Challenges, and Future Directions
(Articles)
Maryam Roshanaei
,
Mahir R. Khan
,
Natalie N. Sylvester
Journal of Information Security
Vol.15 No.3
,July 5, 2024
DOI:
10.4236/jis.2024.153019
1,173
Downloads
8,340
Views
Citations
Optimizing Network Security via Ensemble Learning: A Nexus with Intrusion Detection
(Articles)
Anu Baluguri
,
Vasudha Pasumarthy
,
Indranil Roy
,
Bidyut Gupta
,
Nick Rahimi
Journal of Information Security
Vol.15 No.4
,October 22, 2024
DOI:
10.4236/jis.2024.154030
67
Downloads
652
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2025 Scientific Research Publishing Inc. All Rights Reserved.
Top